System and method for computer security

Inactive Publication Date: 2005-12-27
NORTONLIFELOCK INC
View PDF15 Cites 99 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0015]A system for providing security for a computer network is disclosed. The system comprises a computer configured to generate content for the computer, which computer is associated with the network. The system also comprises a network device configured to determine whether a user should be routed to the generated content and to route the user to the generated content if it is determined that the user should be routed to the generated content.
[0016]A computer computer program product for providing security for a computer network is disclosed. The computer program product is embo

Problems solved by technology

In such cases, the network becomes vulnerable to attacks by unauthorized users, such as so-called computer “hackers”, who may be able to gain unauthorized access to files stored on network computers by using ports or connections provided to connect the network to computers outside of the network.
Since the honey pot files are typically not actually working files, any activity in the honey pot files is suspicious and an attempt is made to identify and locate any user who accesses or attempts to access the files.
There is typically no mechanism for restricting the hacker to viewing only the honey pot files.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for computer security
  • System and method for computer security
  • System and method for computer security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034]A detailed description of a preferred embodiment of the invention is provided below. While the invention is described in conjunction with that preferred embodiment, it should be understood that the invention is not limited to any one embodiment. On the contrary, the scope of the invention is limited only by the appended claims and the invention encompasses numerous alternatives, modifications and equivalents. For the purpose of example, numerous specific details are set forth in the following description in order to provide a thorough understanding of the present invention. The present invention may be practiced according to the claims without some or all of these specific details. For the purpose of clarity, technical material that is known in the technical fields related to the invention has not been described in detail so that the present invention is not unnecessarily obscured.

[0035]FIG. 1 is a block diagram of a general purpose computer system 100 suitable for carrying ou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system and method are disclosed for providing security for a computer network. Content is generated for a computer associated with the network. It is determined whether a user should be routed to the generated content. If it is determined that the user should be routed to the generated content, the user is so routed.

Description

CROSS REFERENCE TO RELATED APPLICATIONS[0001]This application claims priority to U.S. Provisional Patent Application No. 60 / 143,821 entitled “SYSTEM AND METHOD FOR COMPUTER SECURITY” filed Jul. 14, 1999, which is incorporated herein by reference for all purposes, and U.S. Provisional Patent Application No. 60 / 151,531 entitled “SYSTEM AND METHOD FOR PROVIDING COMPUTER SECURITY” filed Aug. 30, 1999, which is incorporated herein by reference for all purposes.[0002]This application is related to co-pending U.S. patent application Ser. No. 09 / 616,805 entitled SYSTEM AND METHOD FOR GENERATING fictitious CONTENT FOR A COMPUTER filed concurrently herewith, which is incorporated herein by reference for all purposes; and co-pending U.S. patent application Ser. No. 09 / 615,891 entitled SYSTEM AND METHOD FOR PREVENTING DETECTION OF A SELECTED PROCESS RUNNING ON A COMPUTER filed concurrently herewith, which is incorporated herein by reference for all purposes; and co-pending U.S. patent applicati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06E1/00G06E3/00G06F1/12G06F7/00G06F9/26G06F9/34G06F9/44G06F11/00G06F11/30G06F12/00G06F12/02G06F12/04G06F12/08G06F12/10G06F12/14G06F13/00G06F15/18G06F17/00G06F17/30G06G7/00H02H3/05H03K19/003H04B1/74H04L1/22H04L9/00H04L9/30H04L9/32H04L29/06
CPCG06F21/53H04L63/10H04L63/1491G06F2221/2127H04L63/1416
Inventor LYLE, MICHAEL P.ROSS, ROBERT F.MARICONDO, JAMES R.
Owner NORTONLIFELOCK INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products